Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1603 lines
56 KiB

/*++
Copyright (c) Microsoft Corporation. All rights reserved.
Module Name:
restore.c
Abstract:
This module contains the following Plug and Play registry merge-restore
routines:
AsrRestorePlugPlayRegistryData
Author:
Jim Cavalaris (jamesca) 3-07-2000
Environment:
User-mode only.
Revision History:
07-March-2000 jamesca
Creation and initial implementation.
--*/
//
// includes
//
#include "precomp.h"
#include "util.h"
#include "debug.h"
#include <regstr.h>
#include <cfgmgr32.h>
//
// private memory allocation definitions
//
#define MyMalloc(size) LocalAlloc(0, size);
#define MyFree(entry) LocalFree(entry);
#define MyRealloc(entry,size) LocalReAlloc(entry, size, 0);
//
// global variables to store the root keys we're working on.
//
// (we really shouldn't have to do this, but it's the easiest way for us to
// reach into one set of keys while recursing through the other set.)
//
HKEY PnpSifRestoreSourceEnumKeyHandle = NULL;
HKEY PnpSifRestoreTargetEnumKeyHandle = NULL;
HKEY PnpSifRestoreSourceClassKeyHandle = NULL;
HKEY PnpSifRestoreTargetClassKeyHandle = NULL;
//
// private definitions
//
// INVALID_FLAGS macro from pnp\inc\cfgmgrp.h
#define INVALID_FLAGS(ulFlags, ulAllowed) ((ulFlags) & ~(ulAllowed))
// private flags for internal RestoreSpecialRegistryData routine
#define PNPSIF_RESTORE_TYPE_DEFAULT (0x00000000)
#define PNPSIF_RESTORE_TYPE_ENUM (0x00000001)
#define PNPSIF_RESTORE_TYPE_CLASS (0x00000002)
#define PNPSIF_RESTORE_REPLACE_TARGET_VALUES_ON_COLLISION (0x00000010)
#define PNPSIF_RESTORE_BITS (0x00000013)
// Enum level definitions describing the subkey types for the specified handles.
#define ENUM_LEVEL_ENUMERATORS (0x0000003)
#define ENUM_LEVEL_DEVICES (0x0000002)
#define ENUM_LEVEL_INSTANCES (0x0000001)
// Class level definitions describing the subkey types for the specified handles.
#define CLASS_LEVEL_CLASSGUIDS (0x0000002)
#define CLASS_LEVEL_DRVINSTS (0x0000001)
//
// private prototypes
//
BOOL
RestoreEnumKey(
IN HKEY hSourceEnumKey,
IN HKEY hTargetEnumKey
);
BOOL
RestoreClassKey(
IN HKEY hSourceClassKey,
IN HKEY hTargetClassKey
);
BOOL
RestoreSpecialRegistryData(
IN HKEY hSourceKey,
IN HKEY hTargetKey,
IN ULONG ulLevel,
IN OUT PVOID pContext,
IN ULONG ulFlags
);
BOOL
MyReplaceKey(
IN HKEY hSourceKey,
IN HKEY hTargetKey
);
BOOL
IsString4DigitOrdinal(
IN LPTSTR pszSubkeyName
);
BOOL
IsDeviceConfigured(
IN HKEY hInstanceKey
);
BOOL
ReplaceClassKeyForInstance(
IN HKEY hSourceInstanceKey,
IN HKEY hSourceRootClassKey,
IN HKEY hTargetRootClassKey
);
//
// routines
//
BOOL
AsrRestorePlugPlayRegistryData(
IN HKEY SourceSystemKey,
IN HKEY TargetSystemKey,
IN DWORD Flags,
IN PVOID Reserved
)
/*++
Routine Description:
This routine restores plug and play data from the the specified source
SYSTEM key to the specified target SYSTEM key, merging intermediate subkeys
and values as appropriate.
Arguments:
SourceSystemKey - Handle to the HKLM\SYSTEM key within the "source"
registry, whose data is to be "merged" into the
corresponding SYSTEM key of the "target" registry, as
specified by TargetSystemKey.
TargetSystemKey - Handle to the HKLM\SYSTEM key within the "target"
registry, that is to receive additional data from the
corresponding SYSTEM key of the "source" registry, as
specified by SourceSystemKey.
Flags - Not used, must be zero.
Reserved - Reserved for future use, must be NULL.
Return Value:
TRUE if successful, FALSE otherwise. Upon failure, additional information
can be retrieved by calling GetLastError().
Notes:
This routine was written specifically to assist in the restoration of the
Plug-and-Play specific registry keys that cannot simply be restored from
backup. It is intended to be called within the context of a
backup-and-restore application's "restore" phase.
During a backup-and-restore application's "restore" phase, the registry that
has been backed-up onto backup medium is to become the new system registry.
Certain Plug and Play values and registry keys, are actually copied into the
backed-up registry from the current registry. Rather than using the backup
registry, or the current registry exclusively, Plug and Play data contained
in these keys should be merged from the current registry into the backup
registry in a way that is appropriate for each key. The backup registry can
then safely replace the current registry as the system registry.
In the context of a backup-and-restore application's "restore" phase, the
"Source" registry key is the one contained in the current running system
registry. The "Target" registry is that which has been backed-up, and will
become the system registry, upon reboot.
The calling thread/process must have both the SE_BACKUP_NAME and
SE_RESTORE_NAME privileges.
--*/
{
LONG result = ERROR_SUCCESS;
HRESULT hr;
HKEY hSystemSelectKey = NULL;
TCHAR pszRegKeySelect[] = TEXT("Select");
TCHAR pszRegValueCurrent[] = TEXT("Current");
TCHAR szBuffer[128];
DWORD dwType, dwSize;
DWORD dwSourceCCS, dwTargetCCS;
//
// Make sure the user didn't pass us anything in the Reserved parameter.
//
if (Reserved) {
SetLastError(ERROR_INVALID_PARAMETER);
return FALSE;
}
//
// Make sure that the user supplied us with valid flags.
//
if(INVALID_FLAGS(Flags, 0x0)) {
SetLastError(ERROR_INVALID_FLAGS);
return FALSE;
}
//
// Determine the CurrentControlSet for the source.
//
result = RegOpenKeyEx(SourceSystemKey,
pszRegKeySelect,
0,
KEY_READ,
&hSystemSelectKey);
if (result != ERROR_SUCCESS) {
hSystemSelectKey = NULL;
goto Clean0;
}
dwSize = sizeof(DWORD);
result = RegQueryValueEx(hSystemSelectKey,
pszRegValueCurrent,
0,
&dwType,
(LPBYTE)&dwSourceCCS,
&dwSize);
RegCloseKey(hSystemSelectKey);
hSystemSelectKey = NULL;
if ((result != ERROR_SUCCESS) ||
(dwType != REG_DWORD)) {
goto Clean0;
}
//
// Determine the CurrentControlSet for the target.
//
result = RegOpenKeyEx(TargetSystemKey,
pszRegKeySelect,
0,
KEY_READ,
&hSystemSelectKey);
if (result != ERROR_SUCCESS) {
hSystemSelectKey = NULL;
goto Clean0;
}
dwSize = sizeof(DWORD);
result = RegQueryValueEx(hSystemSelectKey,
pszRegValueCurrent,
0,
&dwType,
(LPBYTE)&dwTargetCCS,
&dwSize);
RegCloseKey(hSystemSelectKey);
hSystemSelectKey = NULL;
if ((result != ERROR_SUCCESS) ||
(dwType != REG_DWORD)) {
goto Clean0;
}
//
// Open the source CurrentControlSet\Enum key.
//
hr = StringCchPrintf(szBuffer,
SIZECHARS(szBuffer),
TEXT("ControlSet%03d\\Enum"),
dwSourceCCS);
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
result = RegOpenKeyEx(SourceSystemKey,
szBuffer,
0,
KEY_READ, // only need to read from the source
&PnpSifRestoreSourceEnumKeyHandle);
if (result != ERROR_SUCCESS) {
goto Clean0;
}
//
// Open the target CurrentControlSet\Enum key.
//
hr = StringCchPrintf(szBuffer,
SIZECHARS(szBuffer),
TEXT("ControlSet%03d\\Enum"),
dwTargetCCS);
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
result = RegOpenKeyEx(TargetSystemKey,
szBuffer,
0,
KEY_ALL_ACCESS, // need full access to the target
&PnpSifRestoreTargetEnumKeyHandle);
if (result != ERROR_SUCCESS) {
goto Clean0;
}
//
// Open the source CurrentControlSet\Control\Class key.
//
hr = StringCchPrintf(szBuffer,
SIZECHARS(szBuffer),
TEXT("ControlSet%03d\\Control\\Class"),
dwSourceCCS);
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
result = RegOpenKeyEx(SourceSystemKey,
szBuffer,
0,
KEY_READ, // only need to read from the source
&PnpSifRestoreSourceClassKeyHandle);
if (result != ERROR_SUCCESS) {
goto Clean0;
}
//
// Open the target CurrentControlSet\Control\Class key.
//
hr = StringCchPrintf(szBuffer,
SIZECHARS(szBuffer),
TEXT("ControlSet%03d\\Control\\Class"),
dwTargetCCS);
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
result = RegOpenKeyEx(TargetSystemKey,
szBuffer,
0,
KEY_ALL_ACCESS, // need full access to the target
&PnpSifRestoreTargetClassKeyHandle);
if (result != ERROR_SUCCESS) {
goto Clean0;
}
//
// NOTE: We restore the Enum branch first, then restore the Class branch.
// The code that restores these keys depends on it, so do not change this!!
//
// This order makes sense, because relevant Class keys correspond to exactly
// one Enum instance key (but an Enum key may or may not have a Class key),
// so Class keys are only really meaningful in the context of the instance
// key they belong to. This behavior should NOT need to change.
//
//
// Do the merge-restore for the Enum keys, ignore any errors.
//
if (!RestoreEnumKey(PnpSifRestoreSourceEnumKeyHandle,
PnpSifRestoreTargetEnumKeyHandle)) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RestoreEnumKey failed, ")
TEXT("error == 0x%08lx\n"),
GetLastError()));
}
//
// Do the merge-restore for the Class keys, ignore any errors.
//
if (!RestoreClassKey(PnpSifRestoreSourceClassKeyHandle,
PnpSifRestoreTargetClassKeyHandle)) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RestoreClassKey failed, ")
TEXT("error == 0x%08lx\n"),
GetLastError()));
}
Clean0:
//
// Close the open handles.
//
if (PnpSifRestoreSourceEnumKeyHandle) {
RegCloseKey(PnpSifRestoreSourceEnumKeyHandle);
PnpSifRestoreSourceEnumKeyHandle = NULL;
}
if (PnpSifRestoreTargetEnumKeyHandle) {
RegCloseKey(PnpSifRestoreTargetEnumKeyHandle);
PnpSifRestoreTargetEnumKeyHandle = NULL;
}
if (PnpSifRestoreSourceClassKeyHandle) {
RegCloseKey(PnpSifRestoreSourceClassKeyHandle);
PnpSifRestoreSourceClassKeyHandle = NULL;
}
if (PnpSifRestoreTargetClassKeyHandle) {
RegCloseKey(PnpSifRestoreTargetClassKeyHandle);
PnpSifRestoreTargetClassKeyHandle = NULL;
}
if (result != ERROR_SUCCESS) {
SetLastError(result);
}
return (result == ERROR_SUCCESS);
} // AsrRestorePlugPlayRegistryData()
//
// private worker routines for AsrRestorePlugPlayRegistryData
//
BOOL
RestoreEnumKey(
IN HKEY hSourceEnumKey,
IN HKEY hTargetEnumKey
)
/*++
Routine Description:
Restores new device instances in the source (current) Enum key to the target
Enum key, located in the backup registry to be restored. By doing this, the
Enum key from the backup set can safely replace the current Enum key.
All intermediate values from the source (current) registry are restored to
the target (backup), to account for the device instance hash values located
at the root of the Enum key, that have been updated during setup.
During an ASR backup and restore operation, the hash values in the source
(current) registry are propogated to the current registry during textmode
setup, as they are stored the asrpnp.sif file. Since hash values may be
modified by setup, the values in the source (current) registry will be more
relevant than those in the target (backup), so source values should always
be preseverd.
Arguments:
hSourceEnumKey - Handle to the HKLM\SYSTEM\CurrentControlSet\Enum key within
the "source" registry, whose data is to be "merged" into
the corresponding SYSTEM key of the "target" registry, as
specified by hTargetEnumKey.
hTargetEnumKey - Handle to the HKLM\SYSTEM\CurrentControlSet\Enum key within
the "target" registry, that is to receive additional data
from the corresponding SYSTEM key of the "source" registry,
as specified by hSourceEnumKey.
Return Value:
TRUE if successful, FALSE otherwise. Upon failure, additional information
can be retrieved by calling GetLastError().
--*/
{
BOOL bIsRootEnumerated = FALSE;
return RestoreSpecialRegistryData(hSourceEnumKey,
hTargetEnumKey,
ENUM_LEVEL_ENUMERATORS, // (0x0000003)
(PVOID)&bIsRootEnumerated,
PNPSIF_RESTORE_TYPE_ENUM |
PNPSIF_RESTORE_REPLACE_TARGET_VALUES_ON_COLLISION
);
} // RestoreEnumKey
BOOL
RestoreClassKey(
IN HKEY hSourceClassKey,
IN HKEY hTargetClassKey
)
/*++
Routine Description:
Restores new elements of the source Class key to the target Class key,
located in the backup registry to be restored.
Intermediate values from the source registry are coied to the the target
registry only when they do not already exist in the target. Otherwise, the
target values are preseved.
Arguments:
hSourceClassKey - Handle to the HKLM\SYSTEM\CurrentControlSet\Control\Class
key within the "source" registry, whose data is to be
"merged" into the corresponding SYSTEM key of the "target"
registry, as specified by hTargetClassKey.
hTargetClassKey - Handle to the HKLM\SYSTEM\CurrentControlSet\Control\Class
key within the "target" registry, that is to receive
additional data from the corresponding SYSTEM key of the
"source" registry, as specified by hSourceClassKey.
Return Value:
TRUE if successful, FALSE otherwise. Upon failure, additional information
can be retrieved by calling GetLastError().
--*/
{
return RestoreSpecialRegistryData(hSourceClassKey,
hTargetClassKey,
CLASS_LEVEL_CLASSGUIDS, // (0x00000002)
(PVOID)NULL,
PNPSIF_RESTORE_TYPE_CLASS
);
} // RestoreClassKey
BOOL
RestoreSpecialRegistryData(
IN HKEY hSourceKey,
IN HKEY hTargetKey,
IN ULONG ulLevel,
IN OUT PVOID pContext,
IN ULONG ulFlags
)
/*++
Routine Description:
This routine restores the specified source key to the specified target key,
merging intermediate subkeys and values. Values in the subkeys located
above the specified depth level are merged from the source into the target
(with collisions handled according to the specified flags). Subkeys and
values at and below the level specified are merged from the source key to
the target key, with subkeys from the sources replacing any corresponding
subkeys in the target.
Arguments:
hSourceKey - Handle to a key within the source registry, whose data is to be
"merged" into the corresponding key of the target registry, as
specified by hTargetKey.
hTargetKey - Handle to a key within the target registry, that is to receive
data from the corresponding key of the source registry, as
specified by hSourceKey.
ulLevel - Specifies the subkey depth at which "replacement" will
take place. For subkeys above that depth, data in the target
registry will be preserved if present, and copied otherwise.
For keys at the specified level, data from the specified target
key will be replaced by the source key.
pContext - Specifies caller-supplied context for the operation that is
specific to the type of subkeys being restored (see ulFlags
below), and the specified ulLevel parameter.
ulFlags - Supplies flags specifying options for the restoration of the
registry keys. May be one of the following values:
PNPSIF_RESTORE_TYPE_ENUM:
Specifies that the subkeys being restored are subkeys of
the SYSTEM\CurrentControlSet\Enum branch. Device hardware
settings can be inspected at the appropriate ulLevel.
For Enum branch subkeys, the ulLevel parameter describes
also the type of the subkeys contained under the hSourceKey
and hTargetKey keys. May be one of:
ENUM_LEVEL_ENUMERATORS
ENUM_LEVEL_DEVICES
ENUM_LEVEL_INSTANCES
PNPSIF_RESTORE_TYPE_CLASS:
Specifies that the subkeys being restored are subkeys of
the SYSTEM\CurrentControlSet\Control\Class branch. Setup
class or device software settings can be inspected at the
appropriate ulLevel.
For Class branch subkeys, the ulLevel parameter also
describes the type of the subkeys contained under the
hSourceKey and hTargetKey keys. May be one of:
CLASS_LEVEL_CLASSGUIDS
CLASS_LEVEL_DRVINSTS
PNPSIF_RESTORE_REPLACE_TARGET_VALUES_ON_COLLISION:
When a collision occurs while merging values between the
source and target at intermediate levels, replace the
target value with that from the source (the default
behavior is to preserve existing target values above
'ulLevel' in depth from the supplied keys; below 'ulLevel',
only source key values will be present.)
NOTE: it's probably worth noting that a corresponding flag for
replace-target-keys-on-collision is not at all necessary, since
such a behavior can already be implemented with the ulLevel
parameter. (i.e. the ulLevel parameter actually specifies the
level at which all source keys will replace target keys; to
specify that this should ALWAYS be done is the same as
specifying ulLevel == 0)
Return Value:
TRUE if successful, FALSE otherwise. Upon failure, additional information
can be retrieved by calling GetLastError().
Notes:
This routine was written specifically to assist in the restoration of the
Plug-and-Play specific registry keys that cannot simply be restored from
backup. It is intended to be called within the context of a
backup-and-restore application's "restore" phase.
During a backup-and-restore application's "restore" phase, the registry that
has been backed-up onto backup medium is to become the new system registry.
Certain Plug and Play values and registry keys, are actually copied into the
backed-up registry from the current registry. Rather than using the backup
registry, or the current registry exclusively, Plug and Play data contained
in these keys should be merged from the current registry into the backup
registry in a way that is appropriate for each key. The backup registry can
then safely replace the current registry as the system registry.
In the context of a backup-and-restore application's "restore" phase, the
"Source" registry key is the one contained in the current running system
registry. The "Target" registry is that which has been backed-up, and will
become the system registry, upon reboot.
The different restore behaviors required for each of the different sets of
keys can be specified with the appropriate ulLevel, and ulFlags.
--*/
{
LONG result = ERROR_SUCCESS;
DWORD dwIndex = 0;
DWORD dwSubkeyCount, dwMaxSubkeyNameLength;
DWORD dwValueCount, dwMaxValueNameLength, dwMaxValueDataLength;
DWORD dwDisposition;
LPTSTR pszSubkeyName = NULL, pszValueName = NULL;
LPBYTE pValueData = NULL;
BOOL bPossibleRedundantInstanceKeys = FALSE;
//
// Validate parameters
//
if (INVALID_FLAGS(ulFlags, PNPSIF_RESTORE_BITS)) {
SetLastError(ERROR_INVALID_FLAGS);
return FALSE;
}
if ((hTargetKey == NULL) ||
(hTargetKey == INVALID_HANDLE_VALUE) ||
(hSourceKey == NULL) ||
(hSourceKey == INVALID_HANDLE_VALUE)) {
SetLastError(ERROR_INVALID_PARAMETER);
return FALSE;
}
if (ulLevel == 0) {
//
// This is the level at which we should stop merging, so just replace
// hTargetKey with hSourceKey, and we're done.
//
return MyReplaceKey(hSourceKey, hTargetKey);
} else {
//
// At levels above the replacement level, perform a non-destructive
// merge of intermediate subkeys and values; that is, only copy keys and
// values from the source to the target if they do not already exist at
// the target. Otherwise, leave the target keys and values alone, and
// keep traversing subkeys as necessary.
//
//
// Find out information about the hSourceKey values and subkeys.
//
result = RegQueryInfoKey(hSourceKey,
NULL,
NULL,
NULL,
&dwSubkeyCount,
&dwMaxSubkeyNameLength,
NULL,
&dwValueCount,
&dwMaxValueNameLength,
&dwMaxValueDataLength,
NULL,
NULL);
if (result != ERROR_SUCCESS) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegQueryInfoKey failed, ")
TEXT("error == 0x%08lx\n"),
result));
goto Clean0;
}
//
// Allocate space to fold the largest hSourceKey subkey, value and data.
//
dwMaxSubkeyNameLength++;
pszSubkeyName = MyMalloc(dwMaxSubkeyNameLength * sizeof(TCHAR));
if (pszSubkeyName == NULL) {
result = ERROR_NOT_ENOUGH_MEMORY;
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: MyMalloc failed allocating subkey name string, ")
TEXT("error == 0x%08lx\n"),
result));
goto Clean0;
}
dwMaxValueNameLength++;
pszValueName = MyMalloc(dwMaxValueNameLength * sizeof(TCHAR));
if (pszValueName == NULL) {
result = ERROR_NOT_ENOUGH_MEMORY;
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: MyMalloc failed allocating value name string, ")
TEXT("error == 0x%08lx\n"),
result));
goto Clean0;
}
pValueData = MyMalloc(dwMaxValueDataLength * sizeof(TCHAR));
if (pValueData == NULL) {
result = ERROR_NOT_ENOUGH_MEMORY;
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: MyMalloc failed allocating value data buffer, ")
TEXT("error == 0x%08lx\n"),
result));
goto Clean0;
}
//
// Enumerate all hSourceKey values.
//
for (dwIndex = 0; dwIndex < dwValueCount; dwIndex++) {
DWORD dwValueNameLength = dwMaxValueNameLength;
DWORD dwValueDataLength = dwMaxValueDataLength;
DWORD dwType;
result = RegEnumValue(hSourceKey,
dwIndex,
pszValueName,
&dwValueNameLength,
0,
&dwType,
pValueData,
&dwValueDataLength);
if (result != ERROR_SUCCESS) {
//
// Error enumerating values - whatchya gonna do?
// Just move on and try to merge subkeys the best we can?
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegEnumValue returned error == 0x%08lx\n"),
result));
goto EnumSubkeys;
}
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: Enumerated value %d == '%s' on hSourceKey.\n"),
dwIndex, pszValueName));
//
// Query to see if this value exists in the hTargetKey
//
result = RegQueryValueEx(hTargetKey,
pszValueName,
0,
NULL,
NULL,
NULL);
if ((result == ERROR_SUCCESS) &&
!(ulFlags & PNPSIF_RESTORE_REPLACE_TARGET_VALUES_ON_COLLISION)) {
//
// The enumerated value already exists under the target key, and
// we are NOT supposed to replace it.
//
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: Value '%s' already exists on hTargetKey.\n"),
pszValueName));
} else if ((result == ERROR_FILE_NOT_FOUND) ||
(ulFlags & PNPSIF_RESTORE_REPLACE_TARGET_VALUES_ON_COLLISION)){
//
// The enumerated value doesn't exist under the target key, or
// it does and we're supposed to replace it.
//
result = RegSetValueEx(hTargetKey,
pszValueName,
0,
dwType,
pValueData,
dwValueDataLength);
if (result != ERROR_SUCCESS) {
//
// Error setting value - whatchya gonna do?
// Just move on to the next enumerated value.
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegSetValueEx failed setting value '%s', ")
TEXT("error == 0x%08lx\n"),
pszValueName, result));
}
} else {
//
// RegQueryValueEx returned some other error - weird?
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegQueryValueEx failed for value '%s', ")
TEXT("error == 0x%08lx\n"),
pszValueName, result));
}
}
EnumSubkeys:
//
// Perform special processing of the device instance subkeys.
//
if ((ulFlags & PNPSIF_RESTORE_TYPE_ENUM) &&
(ARGUMENT_PRESENT(pContext)) &&
(ulLevel == ENUM_LEVEL_INSTANCES)) {
if (*((PBOOL)pContext)) {
//
// For root enumerated devices, check for the possibility that
// redundant instance keys of a device might have been created
// in the current registry, in which case we should ignore them
// when migrating to the target registry.
//
//
// The possibility of redundant root-enumerated device
// instance keys exists when:
//
// - the device is root-enumerated
//
// - instances of this device already exist in the target hive
//
// a particular device instance is redundant if it is a newly
// created instance in the target registry for a device where
// other instances already exist.
//
DWORD dwTargetSubkeyCount = 0;
if (RegQueryInfoKey(hTargetKey,
NULL,
NULL,
NULL,
&dwTargetSubkeyCount,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL) != ERROR_SUCCESS) {
dwTargetSubkeyCount = 0;
}
bPossibleRedundantInstanceKeys = (dwTargetSubkeyCount > 0);
}
}
//
// Enumerate all hSourceKey subkeys.
//
for (dwIndex = 0; dwIndex < dwSubkeyCount; dwIndex++) {
HKEY hTargetSubkey = NULL, hSourceSubkey = NULL;
DWORD dwSubkeyNameLength = dwMaxSubkeyNameLength;
result = RegEnumKeyEx(hSourceKey,
dwIndex,
pszSubkeyName,
&dwSubkeyNameLength,
0,
NULL,
NULL,
NULL);
if (result != ERROR_SUCCESS) {
//
// Error enumerating subkeys - whatchya gonna do?
// There is nothing left to do, so just exit.
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegEnumKeyEx returned error == 0x%08lx\n"),
result));
goto Clean0;
}
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: enumerated subkey %d == '%s' on hSourceKey.\n"),
dwIndex, pszSubkeyName));
//
// Perform special processing of the Enum subkeys.
//
if ((ulFlags & PNPSIF_RESTORE_TYPE_ENUM) &&
(ARGUMENT_PRESENT(pContext)) &&
(ulLevel == ENUM_LEVEL_ENUMERATORS)) {
//
// At the start of the recursive enumeration for each
// enumerator subkey, reset our (global) BOOL context
// variable to keep track of whether subsequent device
// subkeys represent "ROOT" enumerated devices.
//
PBOOL pbIsRootEnumerated = (PBOOL)pContext;
if (CompareString(LOCALE_INVARIANT,
NORM_IGNORECASE,
(LPTSTR)pszSubkeyName,
-1,
REGSTR_KEY_ROOTENUM,
-1) == CSTR_EQUAL) {
*pbIsRootEnumerated = TRUE;
} else {
*pbIsRootEnumerated = FALSE;
}
}
//
// Open this subkey in hSourceKey
//
result = RegOpenKeyEx(hSourceKey,
pszSubkeyName,
0,
KEY_READ,
&hSourceSubkey);
if (result == ERROR_SUCCESS) {
//
// Attempt to open this subkey in the hTargetKey
//
result = RegOpenKeyEx(hTargetKey,
pszSubkeyName,
0,
KEY_READ,
&hTargetSubkey);
if ((result != ERROR_SUCCESS) &&
(bPossibleRedundantInstanceKeys) &&
(IsString4DigitOrdinal(pszSubkeyName))) {
//
// The subkey is a root-enumerated instance key with a
// 4-digit ordinal name (most-likely autogenerated), where
// we may have redundant keys.
//
// If this key doesn't exist in the target registry, it was
// likely a redundant, autogenerated instance created during
// setup because a previous autogenerated key (i.e. one we
// just migrated) already existed, we just won't migrate it.
//
ASSERT(ulFlags & PNPSIF_RESTORE_TYPE_ENUM);
ASSERT(ulLevel == ENUM_LEVEL_INSTANCES);
ASSERT((ARGUMENT_PRESENT(pContext)) && (*((PBOOL)pContext)));
} else {
if (result == ERROR_SUCCESS) {
//
// We successfully opened the target subkey above (we
// just weren't supposed to delete it) so we should have
// a valid handle.
//
ASSERT(hTargetSubkey != NULL);
dwDisposition = REG_OPENED_EXISTING_KEY;
} else {
//
// Create the target subkey.
//
ASSERT(hTargetSubkey == NULL);
result = RegCreateKeyEx(hTargetKey,
pszSubkeyName,
0,
NULL,
REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS,
NULL,
&hTargetSubkey,
&dwDisposition);
if (result == ERROR_SUCCESS) {
ASSERT(dwDisposition == REG_CREATED_NEW_KEY);
}
}
if (result == ERROR_SUCCESS) {
//
// Check if the key had already existed.
//
if (dwDisposition == REG_CREATED_NEW_KEY) {
//
// We just created this key in the target to replace it
// with the corresponding key in the source.
//
if (!MyReplaceKey(hSourceSubkey, hTargetSubkey)) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: MyReplaceKey failed with error == 0x%08lx\n"),
GetLastError()));
}
} else if ((ulFlags & PNPSIF_RESTORE_TYPE_ENUM) &&
(ulLevel == ENUM_LEVEL_INSTANCES) &&
(!IsDeviceConfigured(hTargetSubkey)) &&
(IsDeviceConfigured(hSourceSubkey))) {
//
// If we are enumerating instances, check if the
// instance keys in the target and source are
// properly configured.
//
//
// If it is not configured in the target, but is
// configured in the source - then we DO want to
// replace the target instance key, because it might
// be some sort of critical device - like a boot
// device. Even if it's not critical, if the device
// has not been seen since before the last upgrade
// *prior* to backup, we can't really have much
// confidence in those settings anyways. If neither
// the target or source are configured, we may as
// well just keep the target, like we do for
// everything else.
//
if (MyReplaceKey(hSourceSubkey, hTargetSubkey)) {
//
// If we successfully replaced the target instance
// key for this device with the source, then also
// replace the corresponding Class key for this
// instance from the target with the Class key from
// the source.
//
// NOTE: this works because we always restore the
// Enum branch before retoring the Class branch, so
// the Class keys haven't been touched yet.
//
if (!ReplaceClassKeyForInstance(hSourceSubkey,
PnpSifRestoreSourceClassKeyHandle,
PnpSifRestoreTargetClassKeyHandle)) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: ReplaceClassKeyForInstance failed, ")
TEXT("error == 0x%08lx\n"),
GetLastError()));
}
} else {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: MyReplaceKey failed, error == 0x%08lx\n"),
GetLastError()));
}
} else if ((ulLevel-1) != 0) {
//
// We're still above the replacement level, and the key
// previously existed in the target, so we're not
// supposed to replace it. Since the next level is NOT
// the replacement level, just follow the keys down
// recursively.
//
ASSERT(dwDisposition == REG_OPENED_EXISTING_KEY);
if (!RestoreSpecialRegistryData(hSourceSubkey,
hTargetSubkey,
ulLevel-1,
(PVOID)pContext,
ulFlags)) {
//
// Error handling the subkeys - whatcha gonna do?
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RestoreSpecialRegistryData failed ")
TEXT("for subkey %s at level %d, error == 0x%08lx\n"),
pszSubkeyName, ulLevel-1,
GetLastError()));
}
} else {
//
// The key already exists, so don't replace it. Also,
// the next level is the replacement level, so don't
// recurse either (else we'd replace it). Basically,
// just do nothing here.
//
ASSERT(ulLevel == 1);
ASSERT(dwDisposition == REG_OPENED_EXISTING_KEY);
}
//
// Close the open target subkey.
//
RegCloseKey(hTargetSubkey);
} else {
//
// could not open/create subkey in taget registry.
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegCreateKey failed to create target subkey %s ")
TEXT("with error == 0x%08lx\n"),
pszSubkeyName, result));
}
}
//
// Close the enumerated hSourceKey subkey.
//
RegCloseKey(hSourceSubkey);
} else {
//
// Could not open the enumerated hSourceKey subkey.
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegOpenKey failed to open existing subkey %s, ")
TEXT("error == 0x%08lx\n"),
pszSubkeyName, result));
}
} // for (dwIndex = 0; dwIndex < dwSubkeyCount; dwIndex++)
} // (ulLevel != 0)
Clean0:
//
// Free any allocated buffers
//
if (pszSubkeyName != NULL) {
MyFree(pszSubkeyName);
}
if (pszValueName != NULL) {
MyFree(pszValueName);
}
if (pValueData != NULL) {
MyFree(pValueData);
}
if (result != ERROR_SUCCESS) {
SetLastError(result);
}
return (result == ERROR_SUCCESS);
} // RestoreSpecialRegistryData
BOOL
MyReplaceKey(
IN HKEY hSourceKey,
IN HKEY hTargetKey
)
/*++
Routine Description:
This routine replaces the target registry key with the source registry key.
This is done by performing a RegSaveKey on the source registry key to a
temporary file, and restoring that file to the target registry key. All
data contained below the target registry key is lost. The source registry
key is not modified by this routine.
Arguments:
hSourceKey - Handle to the key that is the source of the restore operation.
All values and subkeys of the source key will be restored on
top of the target key.
hTargetKey - Handle to the key that is the target of the restore operation.
All values and subkeys of the source key will be restored on
top of this key, and all existing values and data underneath
this key will be lost.
Return Value:
TRUE if successful, FALSE otherwise. Upon failure, additional information
can be retrieved by calling GetLastError().
Notes:
Since this routine uses the RegSaveKey and RegRestoreKey registry APIs, it
is expected that the calling thread/process have both the SE_BACKUP_NAME and
SE_RESTORE_NAME privileges.
--*/
{
LONG result = ERROR_SUCCESS;
HRESULT hr;
TCHAR szTempFilePath[MAX_PATH];
TCHAR szTempFileName[MAX_PATH];
DWORD dwTemp;
//
// Use the temporary directory to store the saved registry key.
//
dwTemp = GetTempPath(MAX_PATH, szTempFilePath);
if ((dwTemp == 0) || (dwTemp > MAX_PATH)) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: GetTempPath failed, ")
TEXT("current directory will be specified.\n")));
// current path specified with trailing '\', as GetTempPath would have.
hr = StringCchCopy(szTempFileName,
SIZECHARS(szTempFileName),
TEXT(".\\"));
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
}
//
// Assign the saved registry key a temporary, unique filename.
//
if (!GetTempFileName(szTempFilePath,
TEXT("PNP"),
0, // make sure it's unique
szTempFileName)) {
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: GetTempFileName failed with error == 0x%08lx, ")
TEXT("using hardcoded temp file name!\n"),
GetLastError()));
hr = StringCchCopy(szTempFileName,
SIZECHARS(szTempFileName),
szTempFilePath);
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
hr = StringCchCat(szTempFileName,
SIZECHARS(szTempFileName),
TEXT("~pnpreg.tmp"));
if (FAILED(hr)) {
result = HRESULT_CODE(hr);
goto Clean0;
}
}
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: Using temporary filename: %s\n"),
szTempFileName));
//
// A side effect of requesting a "unique" filename from GetTempFileName is
// that it automatically creates the file. Unfortunately, RegSaveKey will
// fail if the specified file already exists, so delete the file now.
//
if(pSifUtilFileExists(szTempFileName,NULL)) {
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: Temporary file %s exists, deleting.\n"),
szTempFileName));
SetFileAttributes(szTempFileName, FILE_ATTRIBUTE_NORMAL);
DeleteFile(szTempFileName);
}
//
// Save the source key to a file using the temporary file name.
// (calling thread/process must have the SE_BACKUP_NAME privilege)
//
result = RegSaveKey(hSourceKey,
szTempFileName,
NULL);
if (result == ERROR_SUCCESS) {
//
// Restore the file to the target key.
// (calling thread/process must have the SE_RESTORE_NAME privilege)
//
result = RegRestoreKey(hTargetKey,
szTempFileName,
REG_FORCE_RESTORE);
if (result != ERROR_SUCCESS) {
//
// Failed to restore the file to the target key!
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegRestoreKey from %s failed, ")
TEXT("error == 0x%08lx\n"),
szTempFileName, result));
} else {
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: Key replacement successful.\n")));
}
//
// Delete the temporary file we created, now that we're done with it.
//
DBGTRACE((DBGF_INFO,
TEXT("PNPSIF: Deleting temporary file %s.\n"),
szTempFileName));
ASSERT(pSifUtilFileExists(szTempFileName,NULL));
SetFileAttributes(szTempFileName, FILE_ATTRIBUTE_NORMAL);
DeleteFile(szTempFileName);
} else {
//
// Failed to save the source key.
//
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: RegSaveKey to %s failed with error == 0x%08lx\n"),
szTempFileName, result));
}
Clean0:
if (result != ERROR_SUCCESS) {
SetLastError(result);
}
return (result == ERROR_SUCCESS);
} // MyReplaceKey
BOOL
IsString4DigitOrdinal(
IN LPTSTR pszSubkeyName
)
/*++
Routine Description:
This routine checks if a subkey name has the form of a 4-digit decimal
ordinal (e.g. "0000", "0001", ... , "9999"), that are typically given to
auto-generated root-enumerated device instance ids - i.e. TEXT("%04u").
Arguments:
pszSubkeyName - Subkey name to check.
Return Value:
TRUE if the string has the form of a 4-digit ordinal string, FALSE
otherwise.
--*/
{
LPTSTR p;
ULONG ulTotalLength = 0;
if ((!ARGUMENT_PRESENT(pszSubkeyName)) ||
(pszSubkeyName[0] == TEXT('\0'))) {
return FALSE;
}
for (p = pszSubkeyName; *p; p++) {
//
// Count the caharcters in the string, and make sure its not longer than
// 4 characters.
//
ulTotalLength++;
if (ulTotalLength > 4) {
return FALSE;
}
//
// Check if the character is non-numeric, non-decimal.
//
if ((*p < TEXT('0')) || (*p > TEXT('9'))) {
return FALSE;
}
}
if (ulTotalLength != 4) {
return FALSE;
}
return TRUE;
} // IsString4DigitOrdinal
BOOL
IsDeviceConfigured(
IN HKEY hInstanceKey
)
/*++
Routine Description:
This routine determines whether the device instance specified by the
supplied registry key is configured or not. If a device has configflags, and
CONFIGFLAG_REINSTALL or CONFIGFLAG_FAILEDINSTALL are not set then the
device is considered configured.
Arguments:
hInstanceKey - Handle to a device instance registry key.
Return Value:
TRUE if successful, FALSE otherwise. Upon failure, additional information
can be retrieved by calling GetLastError().
--*/
{
BOOL bDeviceConfigured = FALSE;
DWORD dwSize, dwType, dwConfigFlags;
if ((hInstanceKey == NULL) ||
(hInstanceKey == INVALID_HANDLE_VALUE)) {
return FALSE;
}
dwSize = sizeof(dwConfigFlags);
if ((RegQueryValueEx(hInstanceKey,
REGSTR_VAL_CONFIGFLAGS,
0,
&dwType,
(LPBYTE)&dwConfigFlags,
&dwSize) == ERROR_SUCCESS) &&
(dwType == REG_DWORD) &&
!(dwConfigFlags & CONFIGFLAG_REINSTALL) &&
!(dwConfigFlags & CONFIGFLAG_FAILEDINSTALL)) {
bDeviceConfigured = TRUE;
}
return bDeviceConfigured;
} // IsDeviceConfigured
BOOL
ReplaceClassKeyForInstance(
IN HKEY hSourceInstanceKey,
IN HKEY hSourceRootClassKey,
IN HKEY hTargetRootClassKey
)
/*++
Routine Description:
This routine replaces the class key corresponding to the specified device
instance key (as specified by the "Driver" value in the instance key) in the
target hive with the class key from the source.
Arguments:
hSourceInstanceKey - Handle to a device instance registry key in the source
hive.
hSourceRootClassKey - Handle to the root of the Class branch in the source
hive - the same hive as the specified instance key.
hTargetRootClassKey - Handle to the root of the Class branch in the target
hive.
Return Value:
TRUE if successful, FALSE otherwise.
--*/
{
LONG result = ERROR_SUCCESS;
TCHAR szDriverKeyName[MAX_GUID_STRING_LEN + 5]; // "{ClassGUID}\XXXX"
DWORD dwSize, dwType, dwDisposition;
HKEY hSourceClassSubkey = NULL, hTargetClassSubkey = NULL;
if ((hSourceInstanceKey == NULL) ||
(hSourceInstanceKey == INVALID_HANDLE_VALUE) ||
(hSourceRootClassKey == NULL) ||
(hSourceRootClassKey == INVALID_HANDLE_VALUE) ||
(hTargetRootClassKey == NULL) ||
(hTargetRootClassKey == INVALID_HANDLE_VALUE)) {
return FALSE;
}
//
// Read the REGSTR_VAL_DRIVER REG_SZ "Driver" value from the instance key.
//
szDriverKeyName[0] = TEXT('\0');
dwSize = sizeof(szDriverKeyName);
result = RegQueryValueEx(hSourceInstanceKey,
REGSTR_VAL_DRIVER,
0,
&dwType,
(LPBYTE)szDriverKeyName,
&dwSize);
if (result == ERROR_FILE_NOT_FOUND) {
//
// No "Driver" value, so there's no class key to migrate, which is fine.
//
result = ERROR_SUCCESS;
goto Clean0;
} else if ((result != ERROR_SUCCESS) ||
(dwType != REG_SZ)) {
//
// Any other error is a failure to read the value.
//
goto Clean0;
}
//
// Open the "Driver" key in the source Class branch.
//
result = RegOpenKeyEx(hSourceRootClassKey,
szDriverKeyName,
0,
KEY_READ,
&hSourceClassSubkey);
if (result != ERROR_SUCCESS) {
//
// The instance key had a "Driver" value, so a corresponding key
// *should* exist. If we couldn't open it, it's from some failure
// besides that.
//
return FALSE;
}
//
// Open / create the corresponding key in the target Class branch.
//
result = RegCreateKeyEx(hTargetRootClassKey,
szDriverKeyName,
0,
NULL,
REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS,
NULL,
&hTargetClassSubkey,
&dwDisposition);
if (result != ERROR_SUCCESS) {
goto Clean0;
}
//
// Replace the target class subkey with the source.
//
if (!MyReplaceKey(hSourceClassSubkey, hTargetClassSubkey)) {
result = GetLastError();
DBGTRACE((DBGF_ERRORS,
TEXT("PNPSIF: MyReplaceKey failed with error == 0x%08lx\n"),
result));
}
Clean0:
if (hTargetClassSubkey) {
RegCloseKey(hTargetClassSubkey);
}
if (hSourceClassSubkey) {
RegCloseKey(hSourceClassSubkey);
}
if (result != ERROR_SUCCESS) {
SetLastError(result);
}
return (result == ERROR_SUCCESS);
} // ReplaceClassKeyForInstance